US10542002B2 - Systems and methods for device authentication - Google Patents
Systems and methods for device authentication Download PDFInfo
- Publication number
- US10542002B2 US10542002B2 US15/994,321 US201815994321A US10542002B2 US 10542002 B2 US10542002 B2 US 10542002B2 US 201815994321 A US201815994321 A US 201815994321A US 10542002 B2 US10542002 B2 US 10542002B2
- Authority
- US
- United States
- Prior art keywords
- computing device
- processor
- transitory identity
- transitory
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 207
- 230000004044 response Effects 0.000 claims abstract description 57
- 238000004891 communication Methods 0.000 claims description 218
- 230000003068 static effect Effects 0.000 claims description 55
- 238000012790 confirmation Methods 0.000 claims description 20
- 230000003993 interaction Effects 0.000 claims description 10
- 230000009471 action Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 description 33
- 230000005540 biological transmission Effects 0.000 description 32
- 230000006870 function Effects 0.000 description 32
- 238000010586 diagram Methods 0.000 description 13
- 238000013474 audit trail Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 9
- 230000008867 communication pathway Effects 0.000 description 8
- 230000002093 peripheral effect Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 230000001010 compromised effect Effects 0.000 description 6
- 230000036541 health Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 6
- 230000000007 visual effect Effects 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 235000017060 Arachis glabrata Nutrition 0.000 description 2
- 241001553178 Arachis glabrata Species 0.000 description 2
- 235000010777 Arachis hypogaea Nutrition 0.000 description 2
- 235000018262 Arachis monticola Nutrition 0.000 description 2
- 230000004075 alteration Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 235000020232 peanut Nutrition 0.000 description 2
- 230000035515 penetration Effects 0.000 description 2
- APTZNLHMIGJTEW-UHFFFAOYSA-N pyraflufen-ethyl Chemical compound C1=C(Cl)C(OCC(=O)OCC)=CC(C=2C(=C(OC(F)F)N(C)N=2)Cl)=C1F APTZNLHMIGJTEW-UHFFFAOYSA-N 0.000 description 2
- 230000033764 rhythmic process Effects 0.000 description 2
- 230000001020 rhythmical effect Effects 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000007115 recruitment Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000009423 ventilation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/75—Temporary identity
Definitions
- FIG. 3B is a message flow diagram illustrating another method of authenticating one computing device to another computing device according to various embodiments.
- FIG. 4C illustrates a method 400 b of operations executed by the second computing device as part of the method 400 .
- FIG. 5A is a process flow diagram illustrating a method of protecting communications between two computing devices in the event of an intrusion by an unauthorized party according to various embodiments.
- FIG. 6C illustrates a method 600 b of operations executed by the second computing device as part of the method 600 .
- the term “information transaction” refers to any communication or other exchange of information in which the identity of the participating devices may be authenticated.
- the methods and computing devices configured to implement the methods described herein may be implemented in a variety of contexts in which the identity of the participating devices may be authenticated, such as health care record management, secure communications (e.g., government, business, intelligence community, etc.), public records management systems, voting systems, financial services systems, security brokerage systems, and many others.
- the methods and computing devices configured to implement the methods described herein may be implemented in IoT devices, or among IoT devices and an IoT device controller, such as a router, server, IoT hub, or another similar device.
- various embodiments when implemented in an IoT environment, may be of particular use in preventing distributed denial of service (DDoS) attacks, without human intervention.
- the methods and computing devices configured to implement the methods described herein may authenticate the participation of a computing device in an information transaction.
- the methods and computing devices configured to implement the methods described herein may be implemented in the context of a commercial transaction, to enable performance of a non-repudiable commercial transaction in which, because the participation of specific computing devices may be authenticated, a participant may be unable to later deny participation in the transaction (such as, for example, a card-not-present financial transaction).
- ком ⁇ онент may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a wireless device and the wireless device itself may be referred to as a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one processor or core and/or distributed between two or more processors or cores.
- a transitory identity may be generated dynamically, such as based at least in part on one or more changing or dynamic states of the computing device that generates the transitory identity, or dynamic information obtained by a sensor within the computing device (e.g., a camera, microphone, accelerometer, etc.).
- a computing device may generate its own transitory identity.
- another computing device such as an authentication server, may generate the transitory identity for the computing device, and the transitory identify may be pushed to the computing device, or pulled from the server by the computing device.
- a given transitory identity may be used only once. In such embodiments, a transitory identity that has been used may thereafter be unusable.
- the third computing device may send an instruction to other computing devices (e.g., the first and second computing devices) to generate a new transitory identity.
- each computing device participating in the communication system may periodically or aperiodically generate a new transitory identity.
- new transitory identities may be generated sufficiently before the expiration of one or more current transitory identities securing the communication session to enable the two computing devices and the third computing device to complete the exchanges and authentications of the new transitory identities so that the communication session can continue uninterrupted and secured by the new identities.
- dynamic aspects determined the first computing device may include an image or video clip captured by a camera, a sound clip of ambient sounds captured by a microphone, an audio video clip captured by a camera and microphone, or any other information regarding a surroundings or ambient conditions of the first computing device.
- dynamic aspects may be obtained from other sources that are random and frequently changing, such as external sensors and external sources of random information.
- the second computing device may send an authentication query to a third computing device, which may function as an authentication server or certificate authority.
- the third computing device may maintain an audit trail of successful and failed login attempts.
- the audit trail may include metadata identifying, for example, a time of each attempt, identifiers of the first and second computing devices (and any other participating computing devices), a frequency of use, a frequency of authentication failures, and other details.
- the audit trail may be used for risk analysis, and may be displayed and/or accessible via a dashboard or other reporting mechanism.
- any of the participating computing devices may keep an audit trail.
- copies of transitory identities may be stored as part of the audit trail. Such stored transitory identities may not be used for authentication purposes, but may be used to identify participating computing devices, as well as to confirm the participation in a particular information transaction by a particular computing device.
- the information stored in the audit trail may be used to identify, for example, a computing device that has been targeted for attack in some manner.
- the firewall 198 may be employed to perform network operations such as traffic monitoring, gateway functions, routing, and other similar functions, the firewall 198 may not perform a security function or an authentication function of devices such as the computing devices 184 and 186 . Rather, in the communication system 180 , the computing devices 184 and 186 may communicate with the computing device 188 and/or with each other, enabling authentication of an identity of each of the computing devices 184 and 186 , as well as, in some embodiments, an identity of the computing device 188 .
- the processor 202 may also communicate with a variety of modules for units configured to perform a variety of operations, as further described below.
- the processor 202 may communicate with a communication interface 206 , an authentication module 208 , a hashing module 210 , a transitory identity module 212 , the hash storage module 214 , and a transaction module 216 .
- the modules/units 206 - 216 may be implemented on the computing device 200 in software, and hardware, or in a combination of hardware and software.
- Firmware, chip, system-on-a-chip (SOC), dedicated hardware (i.e., “firmware”) circuit configured to perform operations of the various embodiments, or a combination of dedicated hardware/firmware and a programmable processor.
- the processor 202 , the memory 204 , and the various modules/units 206 - 216 may communicate over a communication bus or any other communication circuitry or interface.
- a processor of a first computing device may obtain a first transitory identity.
- the processor of the first computing device may obtain the first transitory identify by generating the first transitory identity (e.g., operation 302 a ).
- the processor of the first computing device may obtain a generated first transitory identity from a third computing device (e.g., the computing device 108 ) (e.g., operation 302 b ).
- a processor of the second computing device may generate a second transitory identity (e.g., operation 304 a ).
- the processor of the second computing device may obtain the first transitory identify by generating the second transitory identity.
- the processor of the second computing device may obtain a second transitory identity from the third computing device (e.g., operation 304 b ).
- the processor of the third computing device may push the second transitory identity to the second computing device.
- the processor of the second computing device may pull the generated second transitory identity from the third computing device.
- the processor of the second computing device may send an authentication query including the first transitory identity to the third computing device.
- the processor of the first computing device may store an indication of the authentication failure in block 334 .
- FIG. 3D illustrates a method 300 b of operations executed by the second computing device as part of the method 300 .
- the method 300 b may be implemented by a processor (e.g., the processor 202 and/or the like).
- the processor of the second computing device may perform operations of like numbered blocks of the method 300 .
- FIG. 3E illustrates a method 300 c of operations executed by the third computing device as part of the method 300 .
- the method 300 c may be implemented by a processor (e.g., the processor 202 and/or the like).
- the device processor of the third computing device may perform operations of like numbered blocks of the method 300 .
- the third computing device may perform an action based on the first computing device confirmation failure.
- the processor of the third computing device may send a failure notification to an email on record that is associated with the first computing device, to notify a registered user of the first computing device of a possible compromise of the first computing device.
- the processor of the third computing device may determine whether more than one computing device purporting to be the first computing device. Detection of more than one computing device purporting to be the first computing device may indicate that the first computing device has been cloned or otherwise copied in some manner.
- the third computing device may send an alert, made de-authorize the first computing device from participating in the system, may lock the first computing device out of the system, and/or may send command deactivating the first computing device.
- the processor of the second computing device may prevent the performance of the information transaction. In some embodiments, the processor of the second computing device may prevent the completion of one or more operations of the information transaction.
- the processor of the second computing device may receive a transitory identity from the first computing device (i.e., the first device's transitory identity).
- the processor may receive the unencrypted text string from the first computing device.
- the processor may receive the re-encrypted text string from the third computing device.
- the processor of the second computing device may send an indication that the participation of the first computing device in the information transaction is not authenticated in block 440 .
- the processor of the second computing device may send an indication that the participation of the first computing device in the information transaction is authenticated in block 444 .
- the processor the third computing device may receive the encrypted text string from the first computing device.
- the processor of the third computing device may store an indication of the authentication success in block 480 .
- a processor of an electronic security system may monitor a communication system.
- the electronic security system may perform network monitoring, key logging, intrusion detection, traffic analysis, or another operation to perform network monitoring or security functions.
- the processor of the electronic security system may send an indication of the electronic intruder or unauthorized user to a third computing device (e.g., the third computing device 108 ) in block 506 .
- a third computing device e.g., the third computing device 108
- a processor of the third computing device may receive the indication of the electronic intruder or unauthorized user from the electronic security system.
- the processor of the third computing device may send an instruction to a first computing device (e.g., the computing device 102 and 104 ) and the second computing device (e.g., the computing device 106 ) to obtain new transitory identities in block 330 .
- Processors of the first and second computing devices may then perform the operations of blocks 302 and 304 .
- the third computing device in response to receiving an indication that an unauthorized user or electronic intruder has been detected, that a computing device authorization should be removed or blocked, or another similar indication, the third computing device may send an instruction to the first computing device and/or the second computing device to obtain a new transitory identity.
- the processor of the third computing device may receive from the electronic security system an indication of the electronic intruder or unauthorized user.
- FIG. 6A illustrates a method 600 of authenticating a first computing device (e.g., the computing device 102 , 104 , 184 , 186 , and 200 of FIGS. 1B-2 ) to a second computing device (e.g., the computing device 106 , 190 - 196 , and 200 of FIGS. 1B-2 ), and vice versa, through interactions with a third computing device (e.g., 108 , 188 , and 200 of FIGS. 1B-2 ) according to some embodiments.
- FIG. 6B illustrates a method 600 a of operations executed by a processor of the first computing device as part of the method 600 .
- FIG. 6C illustrates a method 600 b of operations executed by a processor of the second computing device as part of the method 600 .
- FIG. 6D illustrates a method 600 c of operations executed by a processor of the third computing device as part of the method 600 .
- the presentation of the human-perceivable indication may provide a readily perceived indication that the second computing device received the small unit of static information from the third computing device.
- the presentation of the human-perceivable indication by the first computing device may provide an additional indication to the first computing device of the identity of the second computing device, by verifying the receipt of the small unit of static information by the second computing device from the third computing device.
- the use of such a small unit of static information to provide an indication of the authentication of the second computing device may aid in mitigating, among other things, spear phishing attacks, man-in-the-middle attacks, and other similar communication attacks involving interception of communication or impersonation of a computing device.
- an e-commerce server may receive from the third computing device (e.g., functioning as an authentication server) a small image file received by the third computing device from the first computing device (e.g., a user device). The e-commerce server may then send the small image file to the first computing device to be included in the website of the e-commerce service, or to provide some other visual indication displayed on the first computing device of the authentication of the second computing device.
- the image encoded by the small image file may be personalized by, and thus readily recognized by, a user of the first computing device.
- FIG. 6B illustrates a method 600 a of operations executed by the first computing device as part of the method 600 .
- the method 600 a may be implemented by a processor (e.g., the processor 202 and/or the like).
- the processor of the first computing device may perform operations of like numbered blocks of the methods 300 and 300 a.
- the processor of the first computing device may receive the small unit of static information.
- FIG. 6C illustrates a method 600 b of operations executed by the second computing device as part of the method 600 .
- the method 600 b may be implemented by a processor (e.g., the processor 202 and/or the like).
- the processor of the second computing device may perform operations of like numbered blocks of the methods 300 and 300 b.
- the processor of the second computing device may send the small unit of static information to the first computing device.
- the processor may then perform the operations of block 352 and optional block 354 as described.
- various embodiments when implemented in an IoT environment, may be of particular use in preventing distributed denial of service (DDoS) attacks, without human intervention.
- Various embodiments may improve the function of a communication system by enabling the performance of a non-repudiable information transaction in which, because the participation of specific computing devices may be authenticated, the authentication procedure may generate evidence creating a presumption that a participant actually participated in the information transaction.
- the mobile wireless communication device 700 may also include speakers 714 for providing audio outputs.
- the mobile wireless communication device 700 may also include a housing 720 , constructed of a plastic, metal, or a combination of materials, for containing all or some of the components discussed herein.
- the mobile wireless communication device 700 may include a power source 722 coupled to the processor 702 , such as a disposable or rechargeable battery.
- the rechargeable battery may also be coupled to the peripheral wireless device connection port to receive a charging current from a source external to the mobile wireless communication device 700 .
- the mobile wireless communication device 700 may also include a physical button 724 for receiving user inputs.
- the mobile wireless communication device 700 may also include a power button 726 for turning the mobile wireless communication device 700 on and off.
- FIG. 9 illustrates an example network element, server device 900 .
- the server device 900 may typically include a processor 901 coupled to volatile memory 902 and a large capacity nonvolatile memory, such as a disk drive 903 .
- the server device 900 may also include a peripheral memory access device such as a floppy disc drive, compact disc (CD) or digital video disc (DVD) drive 906 coupled to the processor 901 .
- a peripheral memory access device such as a floppy disc drive, compact disc (CD) or digital video disc (DVD) drive 906 coupled to the processor 901 .
- Various embodiments may be implemented in any number of single or multi-processor systems.
- processes are executed on a processor in short time slices so that it appears that multiple processes are running simultaneously on a single processor.
- information pertaining to the current operating state of the process is stored in memory so the process may seamlessly resume its operations when it returns to execution on the processor.
- This operational state data may include the process's address space, stack space, virtual address space, register set image (e.g., program counter, stack pointer, instruction register, program status word, etc.), accounting information, permissions, access restrictions, and state information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Collating Specific Patterns (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (37)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/994,321 US10542002B2 (en) | 2016-09-12 | 2018-05-31 | Systems and methods for device authentication |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662393438P | 2016-09-12 | 2016-09-12 | |
US201662423593P | 2016-11-17 | 2016-11-17 | |
US15/395,336 US9722803B1 (en) | 2016-09-12 | 2016-12-30 | Systems and methods for device authentication |
US15/634,265 US10021100B2 (en) | 2016-09-12 | 2017-06-27 | Systems and methods for device authentication |
US15/994,321 US10542002B2 (en) | 2016-09-12 | 2018-05-31 | Systems and methods for device authentication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/634,265 Continuation US10021100B2 (en) | 2016-09-12 | 2017-06-27 | Systems and methods for device authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180367533A1 US20180367533A1 (en) | 2018-12-20 |
US10542002B2 true US10542002B2 (en) | 2020-01-21 |
Family
ID=59382821
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/395,336 Active - Reinstated US9722803B1 (en) | 2016-09-12 | 2016-12-30 | Systems and methods for device authentication |
US15/634,265 Active US10021100B2 (en) | 2016-09-12 | 2017-06-27 | Systems and methods for device authentication |
US15/994,321 Active 2037-02-11 US10542002B2 (en) | 2016-09-12 | 2018-05-31 | Systems and methods for device authentication |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/395,336 Active - Reinstated US9722803B1 (en) | 2016-09-12 | 2016-12-30 | Systems and methods for device authentication |
US15/634,265 Active US10021100B2 (en) | 2016-09-12 | 2017-06-27 | Systems and methods for device authentication |
Country Status (10)
Country | Link |
---|---|
US (3) | US9722803B1 (en) |
EP (1) | EP3510723A4 (en) |
JP (1) | JP2019531567A (en) |
KR (1) | KR102390745B1 (en) |
CN (1) | CN110169011A (en) |
AU (1) | AU2017323547A1 (en) |
CA (1) | CA3035921A1 (en) |
EA (1) | EA036987B1 (en) |
MX (1) | MX2019002625A (en) |
WO (1) | WO2018049116A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12217022B2 (en) | 2022-07-11 | 2025-02-04 | Qwerx Inc. | Systems and methods for direct random information generation from quantum random events |
US12238202B2 (en) | 2023-01-10 | 2025-02-25 | Qwerx Inc. | Systems and methods for continuous generation and management of ephemeral cryptographic keys |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10517021B2 (en) | 2016-06-30 | 2019-12-24 | Evolve Cellular Inc. | Long term evolution-primary WiFi (LTE-PW) |
US9722803B1 (en) | 2016-09-12 | 2017-08-01 | InfoSci, LLC | Systems and methods for device authentication |
US10419226B2 (en) | 2016-09-12 | 2019-09-17 | InfoSci, LLC | Systems and methods for device authentication |
US10356096B2 (en) * | 2017-02-17 | 2019-07-16 | At&T Intellectual Property I, L.P. | Authentication using credentials submitted via a user premises device |
US11463439B2 (en) | 2017-04-21 | 2022-10-04 | Qwerx Inc. | Systems and methods for device authentication and protection of communication on a system on chip |
US10499246B2 (en) | 2017-05-17 | 2019-12-03 | Verizon Patent And Licensing Inc. | Hardware identification-based security authentication service for IoT devices |
US11089059B2 (en) * | 2017-09-15 | 2021-08-10 | Cable Television Laboratories, Inc. | Cloned device detection |
US10728240B2 (en) * | 2017-10-19 | 2020-07-28 | Global Tel*Link Corporation | Variable-step authentication for communications in controlled environment |
US11147459B2 (en) * | 2018-01-05 | 2021-10-19 | CareBand Inc. | Wearable electronic device and system for tracking location and identifying changes in salient indicators of patient health |
US10729211B2 (en) | 2018-04-12 | 2020-08-04 | CareBand Inc. | Wristband locking mechanism, wristband, wearable electronic device and method of securing an article to a person |
CN108833337B (en) * | 2018-04-20 | 2022-06-03 | 南京时代大数据网络安全技术与发展战略研究院有限公司 | Data transmission system and method based on optical communication |
GB2574628B (en) * | 2018-06-13 | 2020-12-09 | Arm Ip Ltd | Attestation of processing |
US11173313B2 (en) | 2018-11-02 | 2021-11-16 | Advanced Neuromodulation Systems, Inc. | Implantable medical device with offline programming limitations and related methods of operations |
US11083900B2 (en) | 2018-11-02 | 2021-08-10 | Advanced Neuromodulation Systems, Inc. | Methods for operating a system for management of implantable medical devices and related systems |
US11173311B2 (en) | 2018-11-02 | 2021-11-16 | Advanced Neuromodulation Systems, Inc. | Methods for programming an implantable medical device and related systems and devices |
US10967190B2 (en) | 2018-11-02 | 2021-04-06 | Advanced Neuromodulation Systems, Inc. | Methods of operating a system for management of implantable medical devices (IMDs) using reconciliation operations and revocation data |
US11090496B2 (en) | 2018-11-02 | 2021-08-17 | Advanced Neuromodulation Systems, Inc. | Implantable medical device using permanent and temporary keys for therapeutic settings and related methods of operation |
US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
JP7213366B2 (en) * | 2019-03-04 | 2023-01-26 | ヒタチ ヴァンタラ エルエルシー | Multi-Way Trust Formation in Distributed Systems |
US11444919B2 (en) * | 2019-05-20 | 2022-09-13 | Woodward, Inc. | Mission critical security zone |
US11449821B2 (en) | 2019-07-16 | 2022-09-20 | Mastercard International Incorporated | Systems and methods for use in facilitating verified deliveries |
US11140156B2 (en) * | 2019-07-16 | 2021-10-05 | Mastercard International Incorporated | Systems and methods for use in binding internet of things devices with identities associated with users |
US11218494B2 (en) * | 2019-07-26 | 2022-01-04 | Raise Marketplace, Llc | Predictive fraud analysis system for data transactions |
US11165817B2 (en) * | 2019-10-24 | 2021-11-02 | Arbor Networks, Inc. | Mitigation of network denial of service attacks using IP location services |
ES2934874T3 (en) * | 2019-11-20 | 2023-02-27 | Siemens Energy Global Gmbh & Co Kg | Secure reset of an Internet of Things IoT device |
US20230046739A1 (en) * | 2020-04-22 | 2023-02-16 | CareBand Inc. | Method and system for connectivity and control of industrial equipment using a low power wide area network |
US11503434B2 (en) * | 2020-04-22 | 2022-11-15 | CareBand Inc. | Method and system for connectivity between a personal area network and an internet protocol network via low power wide area network wearable electronic device |
US12307838B2 (en) * | 2020-04-22 | 2025-05-20 | CareBand Inc. | Method and system for connectivity and control of a hazard-prone environment using a low power wide area network |
US11606347B2 (en) | 2020-08-27 | 2023-03-14 | Cisco Technology, Inc. | Determining session duration for device authentication |
US12081979B2 (en) * | 2020-11-05 | 2024-09-03 | Visa International Service Association | One-time wireless authentication of an Internet-of-Things device |
WO2025100806A1 (en) * | 2023-11-09 | 2025-05-15 | 삼성전자 주식회사 | Method and apparatus for user device to access target device |
Citations (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5729608A (en) | 1993-07-27 | 1998-03-17 | International Business Machines Corp. | Method and system for providing secure key distribution in a communication system |
US6055637A (en) | 1996-09-27 | 2000-04-25 | Electronic Data Systems Corporation | System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential |
US20010044786A1 (en) * | 2000-03-14 | 2001-11-22 | Yoshihito Ishibashi | Content usage management system and method, and program providing medium therefor |
US20020138761A1 (en) | 2000-02-02 | 2002-09-26 | Hirofumi Kanemaki | Authentication system |
US20040131187A1 (en) * | 2002-07-23 | 2004-07-08 | Naoya Takao | Terminal apparatus, communication method, and communication system |
US20050187966A1 (en) | 2004-02-23 | 2005-08-25 | Sony Corporation | Data communicating apparatus, data communicating method, and program |
US20050208940A1 (en) * | 2004-03-19 | 2005-09-22 | Masaaki Takase | Network service system using a temporary use identifier |
US20050216769A1 (en) | 2004-03-26 | 2005-09-29 | Fujitsu Limited | Access source authentication method and system |
US20060087999A1 (en) | 2004-10-22 | 2006-04-27 | Alcatel | Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes |
US20060133613A1 (en) | 2004-12-07 | 2006-06-22 | Eriko Ando | Authentication method of ad hoc network and wireless communication terminal thereof |
US20060136702A1 (en) * | 2004-08-05 | 2006-06-22 | Luc Vantalon | Methods and apparatuses for configuring products |
US20060161775A1 (en) * | 2004-12-30 | 2006-07-20 | O'brien William G | Secure modem gateway concentrator |
US20070186115A1 (en) | 2005-10-20 | 2007-08-09 | Beijing Watch Data System Co., Ltd. | Dynamic Password Authentication System and Method thereof |
US20070256118A1 (en) * | 2005-05-11 | 2007-11-01 | Takashi Nomura | Server Device, Device-Correlated Registration Method, Program, and Recording Medium |
US20080022091A1 (en) | 2006-07-19 | 2008-01-24 | Sanjay Deshpande | Secure Communications |
US20080086646A1 (en) | 2006-10-05 | 2008-04-10 | Ceelox, Inc. | System and method of secure encryption for electronic data transfer |
US20080209214A1 (en) | 2004-09-30 | 2008-08-28 | Koninklijke Philips Electronics, N.V. | Method of Authentication Based on Polyomials |
US20080235768A1 (en) | 2007-03-20 | 2008-09-25 | At&T Knowledge Ventures, Lp | System and method for authentication of a communication device |
US20080313723A1 (en) | 2007-06-15 | 2008-12-18 | Naono Norihiko | Authentication method of information terminal |
US20080313698A1 (en) | 2007-06-13 | 2008-12-18 | Meiyuan Zhao | Apparatus and methods for negotiating a capability in establishing a peer-to-peer communication link |
US20090199009A1 (en) | 2005-06-07 | 2009-08-06 | Pei Yen Chia | Systems, methods and computer program products for authorising ad-hoc access |
US20090282467A1 (en) | 2006-06-19 | 2009-11-12 | Nederlandse Organisatie Voor Toegepast-Natuurweten | Method and system for controlling access to networks |
US20090287921A1 (en) | 2008-05-16 | 2009-11-19 | Microsoft Corporation | Mobile device assisted secure computer network communication |
US20100042833A1 (en) | 2008-08-12 | 2010-02-18 | Platt David C | Data anonymity system |
US20100062758A1 (en) | 2008-09-08 | 2010-03-11 | Proctor Jr James Arthur | Using a first wireless link to exchange identification information used to communicate over a second wireless link |
US20100228981A1 (en) | 2009-03-09 | 2010-09-09 | Oki Electric Industry Co., Ltd. | Communication method, mesh netwrok system and communication terminal |
US20100250952A1 (en) | 2007-11-08 | 2010-09-30 | China Iwncomm Co.., Ltd. | two-way access authentication method |
US20100279611A1 (en) | 2007-12-28 | 2010-11-04 | Panasonic Corporation | Wireless communication terminal and terminal recognizing method |
US20110010543A1 (en) | 2009-03-06 | 2011-01-13 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US20110154037A1 (en) | 2008-07-04 | 2011-06-23 | Anders Orre | Secure digital communications |
US20110197064A1 (en) | 2008-10-06 | 2011-08-11 | Koninklijke Philips Electronics N.V. | Method for operating a network, a system management device, a network and a computer program therefor |
US20120011360A1 (en) | 2010-06-14 | 2012-01-12 | Engels Daniel W | Key management systems and methods for shared secret ciphers |
US20120106735A1 (en) | 2009-06-23 | 2012-05-03 | Panasonic Electric Works Co., Ltd. | Encryption key distribution system |
US20120167169A1 (en) | 2010-12-22 | 2012-06-28 | Canon U.S.A., Inc. | Method, system, and computer-readable storage medium for authenticating a computing device |
US20120170751A1 (en) | 2010-12-29 | 2012-07-05 | Secureall Corporation | Cryptographic communication with mobile devices |
WO2012089967A1 (en) | 2010-12-30 | 2012-07-05 | France Telecom | Method of authenticating a first and a second entity at a third entity |
US8321670B2 (en) | 2008-07-11 | 2012-11-27 | Bridgewater Systems Corp. | Securing dynamic authorization messages |
US20130035067A1 (en) | 2010-04-12 | 2013-02-07 | Huawei Technolgoies Co., Ltd. | Method and apparatus for authenticating communication device |
US20130046972A1 (en) | 2011-02-11 | 2013-02-21 | Matthew John Campagna | Using A Single Certificate Request to Generate Credentials with Multiple ECQV Certificates |
US20130182848A1 (en) | 2011-07-15 | 2013-07-18 | Alcatel-Lucent Usa Inc. | Secure group messaging |
US8510565B2 (en) | 2008-03-06 | 2013-08-13 | China Iwncomm Co., Ltd. | Bidirectional entity authentication method based on the credible third party |
US20130232551A1 (en) | 2010-11-12 | 2013-09-05 | China Iwncomm Co., Ltd. | Method and device for anonymous entity identification |
US20130276092A1 (en) | 2012-04-11 | 2013-10-17 | Yi Sun | System and method for dynamic security insertion in network virtualization |
US20140013108A1 (en) | 2012-07-06 | 2014-01-09 | Jani Pellikka | On-Demand Identity Attribute Verification and Certification For Services |
US20140162601A1 (en) * | 2012-12-12 | 2014-06-12 | Sanghoon Kim | Ephemeral identity for device and service discovery |
US20140164768A1 (en) | 2012-12-12 | 2014-06-12 | Empire Technology Development Llc | Detecting matched cloud infrastructure connections for secure off-channel secret generation |
US8855312B1 (en) | 2012-06-29 | 2014-10-07 | Emc Corporation | Mobile trust broker |
US20150013015A1 (en) * | 2013-03-14 | 2015-01-08 | General Instrument Corporation | Method and apparatus for group licensing of device features |
US20150106898A1 (en) | 2012-03-12 | 2015-04-16 | China Iwncomm Co., Ltd. | Method, device, and system for identity authentication |
US20150222632A1 (en) | 2014-01-31 | 2015-08-06 | Panasonic Intellectual Property Management Co. Ltd. | Unauthorized device detection method, unauthorized device detection server, and unauthorized device detection system |
US20150220726A1 (en) | 2012-10-09 | 2015-08-06 | Zte Corporation | Authentication Method, Authentication Apparatus and Authentication Device |
US20150237026A1 (en) | 2012-08-16 | 2015-08-20 | Tango Mobile, LLC | System And Method For Secure Transactions |
US20150281199A1 (en) | 2014-03-31 | 2015-10-01 | EXILANT Technologies Private Limited | Increased communication security |
US20160063466A1 (en) | 2014-09-02 | 2016-03-03 | Google Inc. | Dynamic digital certificate updating |
US20160099922A1 (en) | 2014-10-06 | 2016-04-07 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
US20160156614A1 (en) | 2014-11-28 | 2016-06-02 | Hcl Technologies Limited | Provisioning a device over an internet of things |
US20160182497A1 (en) | 2014-12-18 | 2016-06-23 | Ned M. Smith | Trusted ephemeral identifier to create a group for a serivce and/or to provide the service |
US9432198B2 (en) | 2010-09-07 | 2016-08-30 | Siemens Aktiengesellschaft | Method for certificate-based authentication |
US9722803B1 (en) | 2016-09-12 | 2017-08-01 | InfoSci, LLC | Systems and methods for device authentication |
US20180131526A1 (en) | 2016-09-12 | 2018-05-10 | InfoSci, LLC | Systems and methods for device authentication |
US10149156B1 (en) * | 2015-12-18 | 2018-12-04 | Amazon Technologies, Inc. | Trusted caller identification |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3678417B2 (en) * | 2002-04-26 | 2005-08-03 | 正幸 糸井 | Personal authentication method and system |
US7613919B2 (en) * | 2004-10-12 | 2009-11-03 | Bagley Brian B | Single-use password authentication |
US7809785B2 (en) * | 2007-05-28 | 2010-10-05 | Google Inc. | System using router in a web browser for inter-domain communication |
-
2016
- 2016-12-30 US US15/395,336 patent/US9722803B1/en active Active - Reinstated
-
2017
- 2017-06-27 US US15/634,265 patent/US10021100B2/en active Active
- 2017-09-08 AU AU2017323547A patent/AU2017323547A1/en not_active Abandoned
- 2017-09-08 EA EA201990708A patent/EA036987B1/en not_active IP Right Cessation
- 2017-09-08 MX MX2019002625A patent/MX2019002625A/en unknown
- 2017-09-08 KR KR1020197010664A patent/KR102390745B1/en active Active
- 2017-09-08 WO PCT/US2017/050614 patent/WO2018049116A1/en unknown
- 2017-09-08 JP JP2019535192A patent/JP2019531567A/en not_active Withdrawn
- 2017-09-08 CA CA3035921A patent/CA3035921A1/en not_active Abandoned
- 2017-09-08 CN CN201780063553.3A patent/CN110169011A/en active Pending
- 2017-09-08 EP EP17849583.4A patent/EP3510723A4/en not_active Withdrawn
-
2018
- 2018-05-31 US US15/994,321 patent/US10542002B2/en active Active
Patent Citations (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5729608A (en) | 1993-07-27 | 1998-03-17 | International Business Machines Corp. | Method and system for providing secure key distribution in a communication system |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US6055637A (en) | 1996-09-27 | 2000-04-25 | Electronic Data Systems Corporation | System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential |
US20020138761A1 (en) | 2000-02-02 | 2002-09-26 | Hirofumi Kanemaki | Authentication system |
US20010044786A1 (en) * | 2000-03-14 | 2001-11-22 | Yoshihito Ishibashi | Content usage management system and method, and program providing medium therefor |
US20040131187A1 (en) * | 2002-07-23 | 2004-07-08 | Naoya Takao | Terminal apparatus, communication method, and communication system |
US20050187966A1 (en) | 2004-02-23 | 2005-08-25 | Sony Corporation | Data communicating apparatus, data communicating method, and program |
US20050208940A1 (en) * | 2004-03-19 | 2005-09-22 | Masaaki Takase | Network service system using a temporary use identifier |
US20050216769A1 (en) | 2004-03-26 | 2005-09-29 | Fujitsu Limited | Access source authentication method and system |
US20060136702A1 (en) * | 2004-08-05 | 2006-06-22 | Luc Vantalon | Methods and apparatuses for configuring products |
US20080209214A1 (en) | 2004-09-30 | 2008-08-28 | Koninklijke Philips Electronics, N.V. | Method of Authentication Based on Polyomials |
US20060087999A1 (en) | 2004-10-22 | 2006-04-27 | Alcatel | Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes |
US20060133613A1 (en) | 2004-12-07 | 2006-06-22 | Eriko Ando | Authentication method of ad hoc network and wireless communication terminal thereof |
US20060161775A1 (en) * | 2004-12-30 | 2006-07-20 | O'brien William G | Secure modem gateway concentrator |
US20070256118A1 (en) * | 2005-05-11 | 2007-11-01 | Takashi Nomura | Server Device, Device-Correlated Registration Method, Program, and Recording Medium |
US20090199009A1 (en) | 2005-06-07 | 2009-08-06 | Pei Yen Chia | Systems, methods and computer program products for authorising ad-hoc access |
US20070186115A1 (en) | 2005-10-20 | 2007-08-09 | Beijing Watch Data System Co., Ltd. | Dynamic Password Authentication System and Method thereof |
US20090282467A1 (en) | 2006-06-19 | 2009-11-12 | Nederlandse Organisatie Voor Toegepast-Natuurweten | Method and system for controlling access to networks |
US20080022091A1 (en) | 2006-07-19 | 2008-01-24 | Sanjay Deshpande | Secure Communications |
US20080086646A1 (en) | 2006-10-05 | 2008-04-10 | Ceelox, Inc. | System and method of secure encryption for electronic data transfer |
US20080235768A1 (en) | 2007-03-20 | 2008-09-25 | At&T Knowledge Ventures, Lp | System and method for authentication of a communication device |
US20080313698A1 (en) | 2007-06-13 | 2008-12-18 | Meiyuan Zhao | Apparatus and methods for negotiating a capability in establishing a peer-to-peer communication link |
US20080313723A1 (en) | 2007-06-15 | 2008-12-18 | Naono Norihiko | Authentication method of information terminal |
US20100250952A1 (en) | 2007-11-08 | 2010-09-30 | China Iwncomm Co.., Ltd. | two-way access authentication method |
US20100279611A1 (en) | 2007-12-28 | 2010-11-04 | Panasonic Corporation | Wireless communication terminal and terminal recognizing method |
US8510565B2 (en) | 2008-03-06 | 2013-08-13 | China Iwncomm Co., Ltd. | Bidirectional entity authentication method based on the credible third party |
US20090287921A1 (en) | 2008-05-16 | 2009-11-19 | Microsoft Corporation | Mobile device assisted secure computer network communication |
US20110154037A1 (en) | 2008-07-04 | 2011-06-23 | Anders Orre | Secure digital communications |
US8321670B2 (en) | 2008-07-11 | 2012-11-27 | Bridgewater Systems Corp. | Securing dynamic authorization messages |
US20100042833A1 (en) | 2008-08-12 | 2010-02-18 | Platt David C | Data anonymity system |
US20100062758A1 (en) | 2008-09-08 | 2010-03-11 | Proctor Jr James Arthur | Using a first wireless link to exchange identification information used to communicate over a second wireless link |
US20110197064A1 (en) | 2008-10-06 | 2011-08-11 | Koninklijke Philips Electronics N.V. | Method for operating a network, a system management device, a network and a computer program therefor |
US20110010543A1 (en) | 2009-03-06 | 2011-01-13 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US20100228981A1 (en) | 2009-03-09 | 2010-09-09 | Oki Electric Industry Co., Ltd. | Communication method, mesh netwrok system and communication terminal |
US20120106735A1 (en) | 2009-06-23 | 2012-05-03 | Panasonic Electric Works Co., Ltd. | Encryption key distribution system |
US8817985B2 (en) | 2009-06-23 | 2014-08-26 | Panasonic Corporation | Encryption key distribution system |
US20130035067A1 (en) | 2010-04-12 | 2013-02-07 | Huawei Technolgoies Co., Ltd. | Method and apparatus for authenticating communication device |
US20120011360A1 (en) | 2010-06-14 | 2012-01-12 | Engels Daniel W | Key management systems and methods for shared secret ciphers |
US9432198B2 (en) | 2010-09-07 | 2016-08-30 | Siemens Aktiengesellschaft | Method for certificate-based authentication |
US20130232551A1 (en) | 2010-11-12 | 2013-09-05 | China Iwncomm Co., Ltd. | Method and device for anonymous entity identification |
US20120167169A1 (en) | 2010-12-22 | 2012-06-28 | Canon U.S.A., Inc. | Method, system, and computer-readable storage medium for authenticating a computing device |
US20120170751A1 (en) | 2010-12-29 | 2012-07-05 | Secureall Corporation | Cryptographic communication with mobile devices |
WO2012089967A1 (en) | 2010-12-30 | 2012-07-05 | France Telecom | Method of authenticating a first and a second entity at a third entity |
US20140057601A1 (en) | 2010-12-30 | 2014-02-27 | France Telecom | Method of authenticating a first and a second entity at a third entity |
US20130046972A1 (en) | 2011-02-11 | 2013-02-21 | Matthew John Campagna | Using A Single Certificate Request to Generate Credentials with Multiple ECQV Certificates |
US20130182848A1 (en) | 2011-07-15 | 2013-07-18 | Alcatel-Lucent Usa Inc. | Secure group messaging |
US20150106898A1 (en) | 2012-03-12 | 2015-04-16 | China Iwncomm Co., Ltd. | Method, device, and system for identity authentication |
US20130276092A1 (en) | 2012-04-11 | 2013-10-17 | Yi Sun | System and method for dynamic security insertion in network virtualization |
US8855312B1 (en) | 2012-06-29 | 2014-10-07 | Emc Corporation | Mobile trust broker |
US20140013108A1 (en) | 2012-07-06 | 2014-01-09 | Jani Pellikka | On-Demand Identity Attribute Verification and Certification For Services |
US20150237026A1 (en) | 2012-08-16 | 2015-08-20 | Tango Mobile, LLC | System And Method For Secure Transactions |
US20150220726A1 (en) | 2012-10-09 | 2015-08-06 | Zte Corporation | Authentication Method, Authentication Apparatus and Authentication Device |
US20140162601A1 (en) * | 2012-12-12 | 2014-06-12 | Sanghoon Kim | Ephemeral identity for device and service discovery |
US20140164768A1 (en) | 2012-12-12 | 2014-06-12 | Empire Technology Development Llc | Detecting matched cloud infrastructure connections for secure off-channel secret generation |
US20150013015A1 (en) * | 2013-03-14 | 2015-01-08 | General Instrument Corporation | Method and apparatus for group licensing of device features |
US20150222632A1 (en) | 2014-01-31 | 2015-08-06 | Panasonic Intellectual Property Management Co. Ltd. | Unauthorized device detection method, unauthorized device detection server, and unauthorized device detection system |
US20150281199A1 (en) | 2014-03-31 | 2015-10-01 | EXILANT Technologies Private Limited | Increased communication security |
US20160063466A1 (en) | 2014-09-02 | 2016-03-03 | Google Inc. | Dynamic digital certificate updating |
US20160099922A1 (en) | 2014-10-06 | 2016-04-07 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
US20160156614A1 (en) | 2014-11-28 | 2016-06-02 | Hcl Technologies Limited | Provisioning a device over an internet of things |
US20160182497A1 (en) | 2014-12-18 | 2016-06-23 | Ned M. Smith | Trusted ephemeral identifier to create a group for a serivce and/or to provide the service |
US10149156B1 (en) * | 2015-12-18 | 2018-12-04 | Amazon Technologies, Inc. | Trusted caller identification |
US9722803B1 (en) | 2016-09-12 | 2017-08-01 | InfoSci, LLC | Systems and methods for device authentication |
US20180131526A1 (en) | 2016-09-12 | 2018-05-10 | InfoSci, LLC | Systems and methods for device authentication |
US10021100B2 (en) | 2016-09-12 | 2018-07-10 | InfoSci, LLC | Systems and methods for device authentication |
Non-Patent Citations (28)
Title |
---|
AMYX, "Managed PKI certificates: One step at a time toward securing the loT", Unshackle the Internet of Things, TechBeacon, 14 pages, (2016). |
Bocek, "Attack on Trust Threat Bulletin: Sony Breach Leaks Private Keys, Leaving Door Open", Venafi Blog, http://www.venafi.com/blog/attack-on-trust-threat-bulletin-sony-breach-leaks, 7 pages, (Jan. 19, 2017). |
Chiba, et al., "Dynamic Authorization Extensions to Remote Authentication Dial in User Service (RADIUS)" Network Working Group, Request for Comments: 5176, 35 pages, (Jan. 2008). |
Cisco, "Dynamic Shared Secrets for the Cisco CMTS Routers", Cisco IOS CMTS Software Configuration Guide, 32 pages, (Feb. 14, 2008). |
Cnodder, et al., "RADIUS Dynamic Authorization Server MIB", Network Working Group, Request for Comments; 4673, 25 pages, (Sep. 2006). |
Commission on Enhancing National CyberSecurity, "Report on Securing and Growing the Digital Economy", 100 pages, (Dec. 1, 2016) (Parts A-C). |
Cremers, C.J.F. et al., "A Family of Multi-Party Authentication Protocols," Eindhoven University Technology, Dept. of Mathematics and Computer Science, 11 pages, (2006). |
DBIR, "2016 Data Breach Investigations Report-89% of breaches had a financial or espionage motive", Verizon 2016 Data Breach Investigations Report, p. 1-85, (2016) (4 Parts A-C). |
DBIR, "2016 Data Breach Investigations Report—89% of breaches had a financial or espionage motive", Verizon 2016 Data Breach Investigations Report, p. 1-85, (2016) (4 Parts A-C). |
Dierks, "The Transport Layer Security (TLS) Protocol Version 1.1", Network Working Group, https://tools.ietf.org/html/rfc4346?cm_mc_uid=55413578387314706858380&cm_mc_sid_50200000=1472153170, pp. 1-174, (Apr. 2006) (Parts A-B). |
Glover, "PC1 3.1: Stop Using SSL and Outdated TLS Immediately", http://blog.securitymetrics.c om/2015/04/pci-3-1- ssl-and-tls.html; pp. 1-6, (Aug. 25, 2016). |
Grass, et al., "DRAFT NIST Special Publication 800-638 Digital Authentication Guideline, Authentication and Lifecycle Management" , National Institute of Standards and Technology, U.S. Department of Commerce, pp. 1-48, (Nov. 18, 2016) (Parts A-B). |
IBM Knowledge Center, "RSCS Dynamic Authorization Server Virtual Machine", 2 pages. |
IBM, "The Secure Sockets Layer and Transport Layer Security", Verification of X.509 Public Key Certificates for Secure Communications, http://www.ibm.com/developerworks/library/ws-ssl-security, pp. 1-48, (Jun. 6, 2012). |
International Preliminary Report on Patentability (Chapter 1 of the Patent Cooperation Treaty) received from the WIPO Office in related application No. PCT/US2017/050614 dated Mar. 21, 2019. |
International Search Report and the Written Opinion of the International Searching Authority in International Application No. PCT/US2017/050614, dated Nov. 16, 2017, 13 pages. |
International Search Report and Written Opinion from the International Searching Authority for International Application No. PCT/US2018/043634, dated Oct. 26, 2018, 13 pages. |
Jarmoc, "Transitive Trust and SSL/TLS Interception Proxies, SecureWorks", https://www.secureworks.com/research/transitive-trust, pp. 1-21, (Mar. 21, 2012). |
Juniper Networks, Inc., "Enabling IMS AAA Dynamic Authorization", 5 pages, (1999-2010). |
Kwong, et al., "On the Feasibility and Efficacy of Protection Routing in IP Networks", University of Pennsylvania Scholarly Commons, Department of Electrical & Systems Engineering, 11 pages, (Dec. 10, 2009). |
Pansa, et al., "Web Security Improving by using Dynamic Password Authentication", 2011 International Conference on Network and Electronics Engineering, pp. 32-36, (2011). |
RSA, "Global Security Chiefs Offer Five Recommendations to Overhaul Outdated Information Security Processes", http://www.rsa.com/en-us/company/newrsoom/global-security-chiefs-offer-five-recommendations -to-overhaul, pp. 1-11, (Dec. 10, 2013). |
RSA, "Two-Factor Authentication Is a Must for Mobile", https://blogs.rsa.com/two-factor-authentication-is-a-must-for-mobile,www.rsa.com, pp. 1-7, (Aug. 24, 2016). |
Stack Exchange, "What can an attacker do with a stolen SSL private key? What should the web Admin do?", Information Security Stack Exchange, 2 pages, (Jan. 19, 2017). |
Wang, X. et al., "ID-Based Authenticated Multi-Party Key Agreement Protocol to Multimedia Applications Systems," 2008 International Conference on Computer Science and Software Engineering, 4 pages, (2008). |
Wikipedia, "Dynamic SSL", https://en.wikipedia.org/wiki/Dynamic_SSL, Dynamic SSL-Wikipedia, the free encyclopedia , pp. 1-4, (Aug. 25, 2016). |
Wikipedia, "Man-in-the-middle attack", https://en.wikipedia.org/w/index.php?title=Man-in-the-middle_attack&oldid=753645501; 5 pages, (Dec. 8, 2016). |
Wikipedia, "Dynamic SSL", https://en.wikipedia.org/wiki/Dynamic_SSL, Dynamic SSL—Wikipedia, the free encyclopedia , pp. 1-4, (Aug. 25, 2016). |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12217022B2 (en) | 2022-07-11 | 2025-02-04 | Qwerx Inc. | Systems and methods for direct random information generation from quantum random events |
US12238202B2 (en) | 2023-01-10 | 2025-02-25 | Qwerx Inc. | Systems and methods for continuous generation and management of ephemeral cryptographic keys |
Also Published As
Publication number | Publication date |
---|---|
US20180367533A1 (en) | 2018-12-20 |
AU2017323547A1 (en) | 2019-05-02 |
US20180077156A1 (en) | 2018-03-15 |
EP3510723A1 (en) | 2019-07-17 |
WO2018049116A1 (en) | 2018-03-15 |
EA201990708A1 (en) | 2019-10-31 |
CN110169011A (en) | 2019-08-23 |
MX2019002625A (en) | 2019-11-25 |
US10021100B2 (en) | 2018-07-10 |
CA3035921A1 (en) | 2018-03-15 |
KR20190067803A (en) | 2019-06-17 |
EP3510723A4 (en) | 2020-06-17 |
US9722803B1 (en) | 2017-08-01 |
KR102390745B1 (en) | 2022-04-25 |
EA036987B1 (en) | 2021-01-25 |
JP2019531567A (en) | 2019-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10542002B2 (en) | Systems and methods for device authentication | |
US10419226B2 (en) | Systems and methods for device authentication | |
US10057269B1 (en) | Systems and methods for device verification and authentication | |
US20210350013A1 (en) | Security systems and methods for continuous authorized access to restricted access locations | |
US10367817B2 (en) | Systems and methods for challengeless coauthentication | |
US10666642B2 (en) | System and method for service assisted mobile pairing of password-less computer login | |
US9659160B2 (en) | System and methods for authentication using multiple devices | |
US9380058B1 (en) | Systems and methods for anonymous authentication using multiple devices | |
Alnahari et al. | Authentication of IoT device and IoT server using security key | |
US12143516B2 (en) | Hardware based authentication and authorization of networked nodes | |
US20170257364A1 (en) | Systems and methods for authentication using authentication votes | |
WO2019045914A1 (en) | Systems and methods for device authentication | |
Mosemann | Assessing Security Risks with the Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
AS | Assignment |
Owner name: INFOSCI, LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ELLINGSON, JOHN;OTTOSON, THOMAS CHARLES;SIGNING DATES FROM 20170206 TO 20170501;REEL/FRAME:046842/0568 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: INFOSCI, LLC, VIRGINIA Free format text: LIEN;ASSIGNOR:THE MARBURY LAW GROUP, PLLC;REEL/FRAME:055134/0476 Effective date: 20190418 |
|
AS | Assignment |
Owner name: INFOSCI, LLC, VIRGINIA Free format text: COURT ORDER;ASSIGNOR:THE MARBURY LAW GROUP, PLLC;REEL/FRAME:057385/0690 Effective date: 20210826 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: QWERX INC., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INFOSCI, LLC;REEL/FRAME:064804/0898 Effective date: 20211019 |